Search results for: claim
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 325

Search results for: claim

295 Parallel Version of Reinhard’s Color Transfer Algorithm

Authors: Abhishek Bhardwaj, Manish Kumar Bajpai

Abstract:

An image with its content and schema of colors presents an effective mode of information sharing and processing. By changing its color schema different visions and prospect are discovered by the users. This phenomenon of color transfer is being used by Social media and other channel of entertainment. Reinhard et al’s algorithm was the first one to solve this problem of color transfer. In this paper, we make this algorithm efficient by introducing domain parallelism among different processors. We also comment on the factors that affect the speedup of this problem. In the end by analyzing the experimental data we claim to propose a novel and efficient parallel Reinhard’s algorithm.

Keywords: Reinhard et al’s algorithm, color transferring, parallelism, speedup

Procedia PDF Downloads 582
294 Fragile States as the Fertile Ground for Non-State Actors: Colombia and Somalia

Authors: Giorgi Goguadze, Jakub Zajączkowski

Abstract:

This paper is written due to overview the connection between fragile states and non-state actors, we should take into account that fragile states may vary from weak, failing and failed. In this paper we will discuss about two countries, one of them is weak (Colombia/ second one is already failed- Somalia. We will try to understand what feeds ill non-state actors such as: terrorist organizations, criminal entities and other cells in these countries, what threats are they representing and how to eliminate these dangers in both national and international scope. This paper is mainly based on literature overview and personal attitude and doesn’t claim to be in scientific chain.

Keywords: fragile States, terrorism, tribalism, Somalia

Procedia PDF Downloads 337
293 Review of Studies on Agility in Knowledge Management

Authors: Ferdi Sönmez, Başak Buluz

Abstract:

Agility in Knowledge Management (AKM) tries to capture agility requirements and their respective answers within the framework of knowledge and learning for organizations. Since it is rather a new construct, it is difficult to claim that it has been sufficiently discussed and analyzed in practical and theoretical realms. Like the term ‘agile learning’, it is also commonly addressed in the software development and information technology fields and across the related areas where those technologies can be applied. The organizational perspective towards AKM, seems to need some more time to become scholarly mature. Nevertheless, in the literature one can come across some implicit usages of this term occasionally. This research is aimed to explore the conceptual background of agility in KM, re-conceptualize it and extend it to business applications with a special focus on e-business.

Keywords: knowledge management, agility requirements, agility, knowledge

Procedia PDF Downloads 235
292 Performance of the Strong Stability Method in the Univariate Classical Risk Model

Authors: Safia Hocine, Zina Benouaret, Djamil A¨ıssani

Abstract:

In this paper, we study the performance of the strong stability method of the univariate classical risk model. We interest to the stability bounds established using two approaches. The first based on the strong stability method developed for a general Markov chains. The second approach based on the regenerative processes theory . By adopting an algorithmic procedure, we study the performance of the stability method in the case of exponential distribution claim amounts. After presenting numerically and graphically the stability bounds, an interpretation and comparison of the results have been done.

Keywords: Marcov chain, regenerative process, risk model, ruin probability, strong stability

Procedia PDF Downloads 287
291 Postmodern Communication Through Semiology

Authors: Mladen Milicevic

Abstract:

This paper takes a semiological approach to show, that the meaning is not located in the art object nor it is exclusively in the mind of the perceiver, but rather lies in the relationship of the two. The ultimate intention of making art is to be presented and perceived by subjective human beings. But there will be as many different interpretations of the art presented to them, as they are individuals in the audience. To support this claim, the latest research from neuroscience, cognitive psychology, and Neo-Darwinism is used. This paper draws on Richard Dawkins’ concept of memes as one of the main tools for explaining how differences get created within various socio-cultural environments. Analyzing pitfalls of the modernist worldview, the author proposes postmodern methods as more efficient ways of understanding today’s complexities in the art, culture, and the world. Deconstructing how these differences have come about, presents a possibility for the transgression of the opposing and many times adamant viewpoints.

Keywords: semiology, music, meme, postmodern

Procedia PDF Downloads 366
290 Determiner Phrase in Persian

Authors: Reza Morad Sahraei, Roghayeh Kazeminahad

Abstract:

Surveying the structure of NP in Persian, this article tries to show that most of NP constituents are either independent of each other or they are dependent to Determiner Phrase (=DP). The writer follows a uniform minimal analysis to illustrate the structural position of relevant constituents of DP, including Possessive Phrase, Ezafat Phrase and Quantifier Phrase, under the tree diagram. The most important point of this article is the claim that NP is mostly one of the dependents of DP. Hence, the final section of the article deals with and analyzes the structure of DP in Persian. The DP analysis undertaken in this article has some advantages. It can explain the internal relevance of all DP constituents and provides them all a uniform analysis. Also, the semantic importance of Persian genitive marker and its role in parsing is borne out.

Keywords: determiner phrase (DP), ezafat phrase (Ezaf P), noun phrase(NP), possessive phrase (PossP), quantifier phrase (QP)

Procedia PDF Downloads 551
289 Execution of Joinery in Large Scale Projects: Middle East Region as a Case Study

Authors: Arsany Philip Fawzy

Abstract:

This study is going to address the hurdles of project management in the joinery field. It is widely divided into two sections; the first one will shed light on how to execute large-scale projects with a specific focus on the middle east region. It will also raise major obstacles that may face the joinery team from the site clearance and the coordination between the joinery team and the construction team. The second section is going to technically analyze the commercial side of the joinery and how to control the main cost of the project to avoid financial problems. It will also suggest empirical solutions to monitor the cost impact (e.g., Variation of contract quantity and claims).

Keywords: clearance, quality, cost, variation, claim

Procedia PDF Downloads 65
288 A Hazard Rate Function for the Time of Ruin

Authors: Sule Sahin, Basak Bulut Karageyik

Abstract:

This paper introduces a hazard rate function for the time of ruin to calculate the conditional probability of ruin for very small intervals. We call this function the force of ruin (FoR). We obtain the expected time of ruin and conditional expected time of ruin from the exact finite time ruin probability with exponential claim amounts. Then we introduce the FoR which gives the conditional probability of ruin and the condition is that ruin has not occurred at time t. We analyse the behavior of the FoR function for different initial surpluses over a specific time interval. We also obtain FoR under the excess of loss reinsurance arrangement and examine the effect of reinsurance on the FoR.

Keywords: conditional time of ruin, finite time ruin probability, force of ruin, reinsurance

Procedia PDF Downloads 356
287 Walking across the Government of Egypt: A Single Country Comparative Study of the Past and Current Condition of the Government of Egypt

Authors: Homyr L. Garcia, Jr., Anne Margaret A. Rendon, Carla Michaela B. Taguinod

Abstract:

Nothing is constant in this world but change. This is the reality wherein a lot of people fail to recognize and maybe, it is because of the fact that some see things that are happening with little value or no value at all until it’s gone. For the past years, Egypt was known for its stable government. It was able to withstand a lot of problems and crisis which challenged their country in ways which can never be imagined. In the present time, it seems like in just a snap of a finger, the said stability vanished and it was immediately replaced by a crisis which resulted to a failure in some parts of their government. In addition, this problem continued to worsen and the current situation of Egypt is just a reflection or a result of it. On the other hand, as the researchers continued to study the reasons why the government of Egypt is unstable, they concluded that there might be a possibility that they will be able to produce ways in which their country could be helped or improved. The instability of the government of Egypt is the product of combining all the problems which affects the lives of the people. Some of the reasons that the researchers found are the following: 1) unending doubts of the people regarding the ruling capacity of elected presidents, 2) removal of President Mohamed Morsi in position, 3) economic crisis, 4) a lot of protests and revolution happened, 5) resignation of the long term President Hosni Mubarak and 6) the office of the President is most likely available only to the chosen successor. Also, according to previous researches, there are two plausible scenarios for the instability of Egypt: 1) a military intervention specifically the Supreme Council of the Armed Forces or SCAF, resulting from a contested succession and 2) an Islamist push for political power which highlights the claim that religion is a hindrance towards the development of their country and government. From the eight possible reasons, the researchers decided that they will be focusing on economic crisis since the instability is more clearly seen in the country’s economy which directly affects the people and the government itself. In addition, they made a hypothesis which states that stable economy is a prerequisite towards a stable government. If they will be able to show how this claim is true by using the Social Autopsy Research Design for the qualitative method and Pearson’s correlation coefficient for the quantitative method, the researchers might be able to produce a proposal on how Egypt can stabilize their government and avoid such problems. Also, the hypothesis will be based from the Rational Action Theory which is a theory for understanding and modeling social and economy as well as individual behavior.

Keywords: Pearson’s correlation coefficient, rational action theory, social autopsy research design, supreme council of the armed forces (SCAF)

Procedia PDF Downloads 378
286 A Hyperexponential Approximation to Finite-Time and Infinite-Time Ruin Probabilities of Compound Poisson Processes

Authors: Amir T. Payandeh Najafabadi

Abstract:

This article considers the problem of evaluating infinite-time (or finite-time) ruin probability under a given compound Poisson surplus process by approximating the claim size distribution by a finite mixture exponential, say Hyperexponential, distribution. It restates the infinite-time (or finite-time) ruin probability as a solvable ordinary differential equation (or a partial differential equation). Application of our findings has been given through a simulation study.

Keywords: ruin probability, compound poisson processes, mixture exponential (hyperexponential) distribution, heavy-tailed distributions

Procedia PDF Downloads 308
285 Bug Localization on Single-Line Bugs of Apache Commons Math Library

Authors: Cherry Oo, Hnin Min Oo

Abstract:

Software bug localization is one of the most costly tasks in program repair technique. Therefore, there is a high claim for automated bug localization techniques that can monitor programmers to the locations of bugs, with slight human arbitration. Spectrum-based bug localization aims to help software developers to discover bugs rapidly by investigating abstractions of the program traces to make a ranking list of most possible buggy modules. Using the Apache Commons Math library project, we study the diagnostic accuracy using our spectrum-based bug localization metric. Our outcomes show that the greater performance of a specific similarity coefficient, used to inspect the program spectra, is mostly effective on localizing of single line bugs.

Keywords: software testing, bug localization, program spectra, bug

Procedia PDF Downloads 113
284 Peaceful Coexistence with Non-Muslims from the Perspective of Quran

Authors: Mohsen Nouraei

Abstract:

Peaceful coexistence with other religions is one of the most important matters raised the issue of religious diversity. Some people believe that the Quranic policy about the non-Muslims is based on the war and regard the reason of the progress of Islam in the early centuries as based on sword force. This article, which is written in a descriptive and analytical method, investigates this claim and evaluates it with the teachings and instructions of the Quran. The result of this paper shows that not only the teachings of the Quran do not cause the problems, but also The Quranic verses has obligated the Muslims to interact peacefully with their doctrinal opponents and exercise justice in this regard. This paper shows that the principle of interaction with non-Muslims is based on peace and coexistence, and Islam is the inspirer of religious coexistence with the followers of other religions.

Keywords: Quran, peace, religious coexistence, Christians, Jewish

Procedia PDF Downloads 383
283 The Consequences of Complaint Offenses against Copyright Protection

Authors: Chryssantus Kastowo, Theresia Anita Christiani, Anny Retnowati

Abstract:

Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation.

Keywords: copyright, enforcement, law, violation

Procedia PDF Downloads 106
282 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 22
281 Relationship between Financial Reporting Transparency and Investment Efficiency: Evidence from Iran

Authors: Bita Mashayekhi, Hamid Kalhornia

Abstract:

One of the most important roles of financial reporting is improving the firms’ investment decisions; however, there is not much supporting evidence for this claim in emerging markets like Iran. In this study, the effect of financial reporting transparency in investment efficiency of Iranian firms has been investigated. In order to do this, 336 listed companies on Tehran Stock Exchange (TSE) has been selected for time period 2012 to 2015 as research sample. For testing our main hypothesis, we classified sample firms into two groups based on their deviation from expected investment: under-investment and over-investment cases. The results indicate that there is positive significant relationship between financial transparency and investment efficiency. In the other words, transparency can mitigate both underinvestment and overinvestment situations.

Keywords: corporate governance, disclosure, investment decisions, investment efficiency, transparency

Procedia PDF Downloads 339
280 Demystifying the Legitimacy of the International Court of Justice

Authors: Roger-Claude Liwanga

Abstract:

Over the last seven decades, there has been a proliferation of international tribunals. Yet, they have not received unanimous approval, raising a question about their legitimacy. A legitimate international tribunal is one whose authority to adjudicate international disputes is perceived as justified. Using the case study of the International Court of Justice (ICJ), this article highlights the three criteria that should be considered in assessing the legitimacy of an international tribunal, which include legal, sociological, and moral elements. It also contends that the ICJ cannot claim 'full' legitimacy if any of these components of legitimacy is missing in its decisions. The article further suggests that the legitimacy of the ICJ has a dynamic nature, as litigating parties may constantly change their perception of the court’s authority at any time before, during, or after the judicial process. The article equally describes other factors that can contribute to maintaining the international court’s legitimacy, including fairness and unbiasedness, sound interpretation of international legal norms, and transparency.

Keywords: international tribunals, legitimacy, human rights, international law

Procedia PDF Downloads 341
279 Accountability Issues in Nigeria

Authors: Victoria Adikpe

Abstract:

The ills of the Nigerian public sector have been identified at various fora to include lack of financial accountability and poor reporting of government performance. With the enthronement of democracy, citizens’ expectations from the government are drifting from the mere provision of public services to efficiency and accountability. One of the major challenges to achieving accountability in Nigeria is the capability of the cash basis of accounting to meet the reporting requirements of policies and programmes of the government. This paper discussed the growing trend in the debate about the adoption of private sector financial management processes in the public sector as part of the public sector reform programmes. The paper does not claim the ultimate superiority of accrual over cash accounting but shows how it will help to further strengthen the quality of government accounting and reporting.

Keywords: cash accounting, accrual accounting, accountability, reporting

Procedia PDF Downloads 306
278 The Feasibility of Economic Science in Islam With an Emphasis on Sadr's Vantage Point

Authors: Yahya Jahangiri, Ali Almasi

Abstract:

Currently capitalism is one of the most important economic issues discussed by great scholars around the world. But Islamic approach, regarding this issue may differ both western and eastern views. A greatest scholar in Islamic economy ‘especially in Shia’ is Martyr Muhammad Baqir Al-Sadr. He wrote “Our economy” (Iqtisaduna) to present an economic point of view according to the Islamic teachings. In this regard firstly we will mention three approaches which are common in Muslim scullers about the economic science and then the main approach which is Sadr's view is described here. His claim explains that Islam and capitalism are in conflict with each other. And finally he explains the relationship between Islam and economy and he suggests the Islamic point of view in economy and its foundations as a solution for economic problems which we face today.

Keywords: Islam, economic science, capitalism, Martyr Sadr

Procedia PDF Downloads 279
277 Remote Video Supervision via DVB-H Channels

Authors: Hanen Ghabi, Youssef Oudhini, Hassen Mnif

Abstract:

By reference to recent publications dealing with the same problem, and as a follow-up to this research work already published, we propose in this article a new original idea of tele supervision exploiting the opportunities offered by the DVB-H system. The objective is to exploit the RF channels of the DVB-H network in order to insert digital remote monitoring images dedicated to a remote solar power plant. Indeed, the DVB-H (Digital Video Broadcast-Handheld) broadcasting system was designed and deployed for digital broadcasting on the same platform as the parent system, DVB-T. We claim to be able to exploit this approach in order to satisfy the operator of remote photovoltaic sites (and others) in order to remotely control the components of isolated installations by means of video surveillance.

Keywords: video surveillance, digital video broadcast-handheld, photovoltaic sites, AVC

Procedia PDF Downloads 146
276 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 100
275 Multivariate Dependent Frequency-Severity Modeling of Insurance Claims: A Vine Copula Approach

Authors: Islem Kedidi, Rihab Bedoui Bensalem, Faysal Manssouri

Abstract:

In traditional models of insurance data, the number and size of claims are assumed to be independent. Relaxing the independence assumption, this article explores the Vine copula to model dependence structure between multivariate frequency and average severity of insurance claim. To illustrate this approach, we use the Wisconsin local government property insurance fund which offers several insurance protections for motor vehicles, property and contractor’s equipment claims. Results show that the C-vine copula can better characterize the multivariate dependence structure between frequency and severity. Furthermore, we find significant dependencies especially between frequency and average severity among different coverage types.

Keywords: dependency modeling, government insurance, insurance claims, vine copula

Procedia PDF Downloads 171
274 Towards a Non-Cohesive Self Metamodernist Literature as Case Study

Authors: Ali Oublal

Abstract:

If any period in history seems appropriate for the study of identity, it is a period of greater mobility; the 21st century. Margaret Wetherill (2009) is thus right while asking who we can be in this age. New biographies of people, their trajectories and new locations appear on the ground; how people do make sense of the self becomes the central question not only for social scientists, and cultural theorists but also for literary critics. New-fangled technologies have resulted in the substitution of stable identities by multiple, fragmented and more uncertain identities. A liquid sense of the self as well as unstable and dynamic forms of life does not fail to inspire novelists who have given robust sense of identities attributed to their characters. The following account comes to snapshot features of identity as being presented by meta-modernist novels: the sympathizer, sisters and a girl is a half formed thing. It is a stance that refutes the claim of Elliott‘s who still adheres the stable state of identity in meta-modernist age while reconciling the two paradigms modernity and postmodernity.

Keywords: identity, metamodernism, fragmantation, stability, literature

Procedia PDF Downloads 61
273 Supersized Pricing and Anticipated Consumption Guilt: The Moderating Role of Product Type and Health Claims

Authors: Asim Shabir, Ruqia Shaikh

Abstract:

Supersized pricing is an effective strategy often used by marketers to make consumers buy more. However, such a strategy also results in more purchases and consumption, especially of hedonic food products. This study brings interesting insights about supersized pricing as it provides value-based justification to consumers; as a result, the guilt associated with the purchase and consumption of hedonic products diminishes, which mediates the impact between supersized pricing and size choice. Interestingly, there is a three-way interaction between pricing, product type, and health goal prime. Health prime diminishes the impact of supersized pricing in the case of more hedonic products (unhealthy) compared to less hedonic (perceived as healthy) products.

Keywords: supersized pricing, anticipated consumption guilt, health claim, product type

Procedia PDF Downloads 72
272 Parallels Between Indian Art Music and Western Art Music: The Suppression of the Notion of the 'Melody'

Authors: Kedarnath Awati

Abstract:

Some parallels between Indian Art Music and Western Art Music, such as the identity of the basic heptatonic scale structure, are quite obvious and need no further discussion. Other parallels are far less obvious, and it is one of them that the author is interested in. Specifically, the author would like to make a serious claim that in both types of music, there is an unspoken dependence on melody. Yes, it is true that the techniques that the two systems use for elaboration are very, very different: Western music uses the techniques of harmony, counterpoint, orchestration and motivic variation, while the Indian systems, both the Hindustani and the Carnatic traditions use the technique of raagdaari. The reason that this point is barely spoken about is that both in the West as well as in India, artists tend to think of melody as something elementary or as something 'given'. The Indian musicians would much rather dwell upon this or that meend or taan or other technical device, while the West thinks that melody is passé and would rather discuss the merits and demerits of spectralism and perhaps serialism. The author would like to explore this theme further in his paper.

Keywords: Indian art music, Western art music, melody, raagdaari, motivic variation.

Procedia PDF Downloads 34
271 Kant on Lying to God: The Intention to Deceive

Authors: James E. Mahon

Abstract:

This paper addresses the important question in the philosophy of lies and deception of whether all lying requires an intention to deceive. It does by examining a recent attempt by two philosophers to argue that Immanuel Kant abandoned the view that all lying requires an intention to deceive, in order to be able to claim that lying to God was possible. Ian Proops and Roy Sorensen have recently argued that although Kant always held that it was impossible for anyone to intend to deceive God, late in his life he came to believe that it was possible to lie to God. Kant came to believe that this was possible, they argue, because Kant came to believe that lying is not always deceptive, and that it was possible to tell non-deceptive lies, including non-deceptive lies to God. In this paper their arguments will be broken down and analyzed. Based on a close textual reading of the published works and the Kant’s lectures on ethics, it will be argued that Proops and Sorensen are wrong about what Kant believed about lying in general and lying to God in particular. This paper concludes that Kant never did abandon the Deceptionist position that all lying requires an intention to deceive.

Keywords: Kant, lie, deception, intention, God, ethics, belief, assertion

Procedia PDF Downloads 13
270 The Case of Plagiarism and Its Presence in Classical Arabic Poetry

Authors: Yusuf Seller

Abstract:

Classical Arabic poetry was narrated by the followers of poets, who were memorizing and repeating all the couplets of their master constantly. Although the students established their own styles, it was very natural for them to reflect the style and expression of their masters. This reflection was discussed in classical Arabic literary criticism and rhetoric (al-‘ilm al-balagha), as “al-Sariqah al-shiriyyah”, plagiarism in poetry. This study tests the claim that the reflection of the master's style and expressions in the student's poetry cannot be considered plagiarism. In addition, one of the goals of this essay is also to investigate the methodological emergence of plagiarism phenomena in classical Arabic poetry. The investigation of the methodological origins of plagiarism helps us see the relationship of plagiarism with literary property and the extent of the property`s authenticity. Therefore, the focus is directed towards uncovering the underlying ethical principles governing literary works and academic research in classical Arabic poetry.

Keywords: Arabic literary criticism, classical Arabic poetry, plagiarism, al-Sariqah al-shiriyyah

Procedia PDF Downloads 16
269 Modification of Fick’s First Law by Introducing the Time Delay

Authors: H. Namazi, H. T. N. Kuan

Abstract:

Fick's first law relates the diffusive flux to the concentration field, by postulating that the flux goes from regions of high concentration to regions of low concentration, with a magnitude that is proportional to the concentration gradient (spatial derivative). It is clear that the diffusion of flux cannot be instantaneous and should be some time delay in this propagation. But Fick’s first law doesn’t consider this delay which results in some errors especially when there is a considerable time delay in the process. In this paper, we introduce a time delay to Fick’s first law. By this modification, we consider that the diffusion of flux cannot be instantaneous. In order to verify this claim an application sample in fluid diffusion is discussed and the results of modified Fick’s first law, Fick’s first law and the experimental results are compared. The results of this comparison stand for the accuracy of the modified model. The modified model can be used in any application where the time delay has considerable value and neglecting its effect reflects in undesirable results.

Keywords: Fick's first law, flux, diffusion, time delay, modified Fick’s first law

Procedia PDF Downloads 372
268 Domestic Violence Against Women (With Special Reference to India): A Human Rights Issue

Authors: N. B. Chandrakala

Abstract:

Domestic violence is one of the most under-reported crimes. Problem with domestic violence is that it is not even considered as abuse in many parts of the world especially certain parts of Asia, Africa and Middle East. It is viewed as “doing the needful”. Domestic violence could be in form of emotional harassment, physical injury or psychological abuse perpetrated by one of the family members to another. It is a worldwide phenomenon mainly targeting women. The acts of violence have terrible negative impact on women. It is also an infringement of women’s rights and can be safely termed as human rights abuse. In cases pertaining to domestic violence, male adults often misuses his authority and power to control another using physical or psychological means. Violence and other forms of abuse are common in domestic violence. Sexual assaults, molestation and battering are common in these cases. Domestic violence is a human rights issue and a serious deterrent to development. Domestic violence could also take place in subtle forms like making the person feel worthless or not giving the victims any personal space or freedom. The problematic aspect is cases of domestic violence are very rarely reported. The majority of the victims are women but children are also made to suffer silently. They are abused and neglected. Their innocent minds are adversely affected with the incidents of domestic violence. According to a report by World Health Organization (WHO), sexual trafficking, female feticide, dowry death, public humiliation and physical torture are some of the most common forms of domestic violence against Indian women. Such acts belie our growth and claim as an economic superpower. It is ironic that we claim to be one of the most rapidly advancing countries in the world and yet we have done hardly anything of note against social hazards like domestic violence. Laws are not that stringent when it comes to reporting acts of domestic violence. Even if the report is filed it turns out to be a long drawn process and not every victim has that much resource to fight till the end. It is also a social taboo to make your family matters public. The big challenge in front now is to enforce it in true sense. Steps that are actually needed; tough laws against domestic violence, speedy execution and change in the mindset of society only then we can expect to have some improvement in such inhuman cases. An effective response to violence must be multi-sectoral; addressing the immediate practical needs of women experiencing abuse; providing long-term follow up and assistance; and focusing on changing those cultural norms, attitudes and legal provisions that promote the acceptance of and even encourage violence against women, and undermine women's enjoyment of their full human rights and freedoms. Hence the responses to the problem must be based on integrated approach. The effectiveness of measures and initiatives will depend on coherence and coordination associated with their design and implementation.

Keywords: domestic violence, human rights, sexual assaults, World Health Organization

Procedia PDF Downloads 513
267 Discourse Markers in Chinese University Students and Native English Speakers: A Corpus-Based Study

Authors: Dan Xie

Abstract:

The use of discourse markers (DMs) can play a crucial role in representing discourse interaction and pragmatic competence. Learners’ use of DMs and differences between native speakers (NSs) and non-native speakers (NNSs) in the use of various DMs have been the focus of considerable research attention. However, some commonly used DMs, such as you know, have not received as much attention in comparative studies, especially in the Chinese context. This study analyses data in two corpora (COLSEC and Spoken BNC 2014 (14-25)) to investigate how Chinese learners differ from NNSs in their use of the DM you know and its functions in speech. The results show that there is a significant difference between the two corpora in terms of the frequency of use of you know. In terms of the functions of you know, the study shows that six functions can all be present in both corpora, although there are significant differences between the five functional dimensions, especially in introducing a claim linked to the prior discourse and highlighting particular points in the discourse. It is hoped to show empirically how Chinese learners and NSs use DMs differently.

Keywords: you know, discourse marker, native speaker, Chinese learner

Procedia PDF Downloads 36
266 Safety Factors for Improvement of Labor's Health and Safety in Construction Industry of Pakistan

Authors: Ahsan Ali Khan

Abstract:

During past few years, researchers are emphasizing more on the need of safety in construction industry. This need of safety is an important issue in developing countries. As due to development they are facing huge construction growth. This research is done to evaluate labor safety condition in construction industry of Pakistan. The research carried out through questionnaire survey at different construction sites. Useful data are gathered from these sites which then factor analyzed resulting in five factors. These factors reflect that most of the workers are aware of the safety need, but they divert this responsibility towards management and claim that the work is more essential for management instead of safety. Moreover, those work force which is unaware of safety state that there is lack of any training and guidance from upper management which lead to many unfavorable events on construction sites. There is need of implementation safety activities by management like training, formulation of rules and policies. This research will be helpful to divert management attention towards safety need so they will make efforts for safety of their manpower—the workers.

Keywords: labor's safety, management role, Pakistan, safety factors

Procedia PDF Downloads 159